Saturday, April 4, 2020

Passport Management and Monitoring System


PASSPORT MANAGEMENT AND MONITORING SYSTEM PROJECT REPORT



The main purpose of this project, entitled as “Passport Management and Monitoring Systems” is to provide the facility of displays the details when the User apply for Passport after mailing his resume.When the developed system runs successfully, it can be also be used that the all Passport company can automatically get the Passport of the user they have same Passport vacancies.
Online User register facility could be brought on Web that would enable the User to register and can see the detail in the system itself by entering his login id No.
There should be some page like Passport sample question paper and online test can give the better option for finding Passport and company need only to conduct viva-exam not written exam for that user who has passed online examination.
If user want to send Passport detail to his friend then there is option to mail Passport detail to friend is necessary in Passport page.
Each of these tasks serves describes the problem so that an overall approach or solution may be synthesized.



Download Code



TABLE OF CONTENTS
S.no
Contents
Page no
1.
Synopsis
1-24
2.
Project Title
25-25
3.
Introduction
26-26
4.
Objective         
27-27
5.
System Analysis
28-45

 6.1 Identification of Need
28-29

 6.2   Preliminary Investigation
29-30

  6.3   Feasibility Study
30-32

              6.4   Project Planning
33-34

             6.5   Project scheduling
35-35

        6.6   Software Requirement Specification          
36-40

             6.7   Software Engineering Paradigm Applied
40-41

             6.8   Project Diagram
41-45
6.
 System Design      
46-77

  7.1   Modularization Details
46-47

  7.2   Data Base Design
48-54

7.3 User Interface Design
55-77
7.
Coding
78-130

            8.1    Complete Project Coding
78-128

            8.3    Code Efficiency
129-129

            8.4    Code Optimization
129-129

            8.5     Validation Check
130-130
8.
Testing
131-135

9.1  Testing Techniques
131-132

              9.2 Testing Strategies
132-135
9.
System Security Measures
136-136
10.
Implementation and Maintenance
137-139
11.
Cost Estimation of The Project
140-142
12.
Pert Chart ,Gantt Chart
143-145
13.
Future Scope
146-147
14.
Bibliography
148-148











PROJECT TITLE




 Passport Management and Monitoring Systems



INTRODUCTION



                       

Since the advent of computers in last two decades, every organization is going under the process of computerization. The computerization has many benefits. Primarily a computer is helpful in four major aspects of any kind of organization:
v  Time efficiency
v  Cost effective
v  Huge data storage capacity
v  Simple operation.
This is a public website for appling for Passport online. All the registered users of Passport site have there own personal home page. The Passport site include a Search button for finding Quick Passport, it has four option that is
v  Search by location
v  Search by Date
v  Search by Qualification.
v  Search by Passport Title.
This Passport site uses forms authentication to authenticate users. When new users register the forms, authentication module automatically give a authentication ticket to the user’s browser to identify the user.
Several of the pages include in the Passport site use validation controls to validate form information before it is added to Database table.
To simplify development all the pages in the Passport site are built with user controls. For example, the standard header and footer for each page are created with header and footer user control. Uses of the website can publicity post Passport and find better Passport of companies. If a user is interested in a Passport , the user can submit a resume, and if employer is interested in that user then they enquiry about user and send response by mail or phone.




OBJECTIVE 


The objectives of developing the Passport center are as given below: -
v  To store data of the entire user who are registered in the site.
v  To solve the user’s problem in time efficient manner. Helping the user to search different Passport with a robust search tools
v  To facilitate easy and efficient retrieval of data as and when required for Passport by the company.
v  To generate and print out the various reports.
v  Online updating of all type of data, updating data using web based interfaces and with the help of buttons and links in an easy and convenient way.
v  Data security is maintained to relatively high level by implementing it at Database level, so as to ensure that only authorized users have access to confidential client information.
v  Developing a viable candidate system that fulfill the Faster and accurate information retrieval
v  Easy registration
v  Login dependent information retrieval and updating.Correct and consistent maintenance of data and its quick retrieval
v  Improving the switches button and hyperlink so that the candidate shall find all the queries they need at first sight.
The overall objective of the system to bring the IT-Passport seeker and employer round the globe more closely to each other so that Passport seeker can get correct Passport and employer can get the correct candidate.




SURVEY OF TECHNOLOGY



v SERVER SIDE COMPONENTS: ACTIVE SERVER PAGES

In the world of web-accessible ASP.NET application Active server pages and Servlets occupy a central position between enabled clients and application servers. ASP working in the environment of the web container that provides connection and services.By means of these connections, ASP control the presentation of data derived from operations on database to network-connected clients. This client role is suggested in figure-                                                                                                                                                                                                             



            

                     

Client Presentation



HTML, Multimedia, XML Objects 

Server presentation control

 


Binary files, Query, Result, XML

Business Logic


          
Binary files, Query, Result, XML
Back End Database
 



v  SQL DATABASE MANAGEMENT SYSTEM
Database systems have become ubiquitous across the computing landscape. This is partly because of the basic facilities offered by database management systems: physical data independence, ACID transaction properties, a high-level query language, stored procedures, and triggers. These facilities permits sophisticated applications to ‘push’ much of their complexity into the database itself. The proliferation of database systems in the mobile and embedded market segments is due, in addition to the features above, to the support for two-way database replication and synchronization offered by most commercial database management systems. Data synchronization technology makes it possible for remote users to both access and update corporate data at a remote, off-site location. With local (database) storage, this can be accomplished even when disconnected from the corporate network.
SQL is a realational database management system.
A relational database management system (RDBMS) is a program that lets you  create, update, and administer a relational database. Most commercial RDBMS's use the Structured Query Language (SQL) to access the database, although SQL was invented after the development of the relational model and is not necessary for its use.
The leading RDBMS products Microsoft's SQL Server. Despite repeated challenges by competing technologies, as well as the claim by some experts that no current RDBMS has fully implemented relational principles, the majority of new corporate databases are still being created and managed with an RDBMS.




PROJECT CATEGORY




“Web Based RDBMS”
The relational model was propounded by E.F. codd of the IBM in 1972. One of the main advantages of the relational model is that it is conceptually simple and more importantly based on mathematical theory of relation. It is also frees the users from details of storage structure and access methods.
A database can be understood as a collection of related files. How those files are related depends on the model used. Early models included the hierarchical model (where files are related in a parent/child manner, with each child file having at most one parent file), and the network model (where files are related as owners and members, similar to the network model except that each member file can have more than one owner).
FUTURE OR RDBMS: -
ü  Data are the values stored in the database. On its own, data means very little.
ü  A database is a collection of tables.
ü  Each table contains records, which are the horizontal rows in the table. These are also called tuples.
ü  Each record contains fields, which are the vertical columns of the table. These are also called attributes.
ü  Fields can be of many different types. There are many standard types, and each DBMS (database management system, such as Oracle or SQL) can also have their own specific types, but generally they fall into at least three kinds - character, numeric and date
ü  The domain refers to the possible values each field can contain (it's sometimes called a field specification).
ü  An index is a physical mechanism that improves the performance of a database. Indexes are often confused with keys
ü  A view is a virtual table made up of a subset of the actual tables.

HARDWARE & SOFTWARE SPECIFICATION



The hardware & software specification and environment specifications used by programmers are:
HARDWARE:
ü  Computer system: Standard pc/at compatible with Pentium 3 or Pentium 4 CPU or more.
ü  Primary memory: This Information System works within 1 G.B. if user memory (RAM) addressed by MS windows.
ü  Hard disk having 1GB free space.
ü  Input device:  Mouse & keyboard compatible with PC/ AT, video adapters and   monitors. It is a colored program so better to use a colored monitor
ü  Color monitors for best   performance.
SOFTWARE:
ü  Windows xp or above
ü  Ms Visual Studio 2008
ü  MsSqlSrver 2005
ü  Internet explorer 5.0.
ü  IIS 5.0 or above
ü  The hardware & software specification and environment specifications to run the application.




DESIGN SPECIFICATION





1.     USE CASE DIAGRAM

2DATA FLOW DIAGRAM




(CONTEXT LEVEL DFD)





Control no info


Login info


info


info


Browser


Enter Document


 Login Password



   Control No


Selection process



Login process



     Process


Login register


 New applicant
 Database                 


database


info


Selection info


Process info


New applicant info

FIRST LEVEL DFD



     









User process info


info


info


info


info


info


info


info


   Applicant Interact   
       Process


login


Registered



  Login Process


 Register    
 Process


    Configure    
      System


Applicant profile details


   System Updating


Applicant details


Apply Details


Registration  info


Login   info


Registration  info
SECOND  LEVEL DFD


  1. ENTITY RELATIONSHIP DIAGRAM

 




DATABASE STRUCTURE



v Passport table

Field Name
Data Type
Size
Description
Passport code
Integer, [ Primary key ] 
10
Passport code
User id
Integer , [Foreign Key]
10
User code
User first name
Varchar
50
First name of the user
User last name
Varchar
50
Last name of the user
Date of birth
Date/time

Birth Date of the user
Address
Varchar
50
First location
City
Varchar
50
City of the location
State
Varchar
50
State name
Zip
Integer
10
Zip code of the city
Country
Varchar
50
User country name
Phone
Integer
10
Phone no of the user
Email
Varchar
50
Email id of the user
Sex
Boolean

Male(M),female(F)
Qualification1
Varchar
50
First qualification
Qualification2
Varchar
50
Second qualification
Qualification3
Varchar
50
Higher qualification

v Login table


Field name
Data Type
Size
Description
User id
Varchar, Primary key
  50
User id is the E-mail_id of the user)
User password
Varchar
  50
Registered user have pwd



v Apply table

Field Name
Data Type
Size
Description
Apply date
Date

Apply date of the Passport
Passport id
Integer, [Foreign Key]
10
Applicant Passport id
User id
Integer , [Foreign Key]
10
Applicant User id
Response
Varchar
150
Pending , Short listedRejected

v Passport table
Field Name
Data Type
Size
Description
Passport _Id
Varchar, [primary key ]
50
Passport id
Passport _sdate
Date

Passport apply date
Passport _mail_id
Varchar
50
Passport email id
Passport _location
Varchar
50
Passport location

v Enqirytable
Field Name
Data Type
Size
Description
enquiry _id
Varchar, [primary key ]
 50
Enquiry id
enquiry _date
Date

Enquiry date
enquiry _status
Varchar
 50
Status of enquiery
enquiry _description
Varchar
 50
Description of enquiey


v Delevery
Field Name
Data Type
Size
Description
delivery_number
Varchar, [primary key ]
  50
Deleveryid
delivery _date
Date

Delevery date
delivery _status
Varchar
   50
Status of Delevery
delivery _address
Varchar
   50
Address of delivery
delivery _contact
Varchar
   50
Contact detail of person
Remark
Varchar
   50
Remark for delevery





PROCESS LOGIC







MODULES



The project include following main modules:-

·         Login of the Passport Aplicant
·         Registration of user.
·         Passport description.
·         User profile information.
·         The validation master
·         Report genaration
·         Brief description of the all modules.
Login of the Passport -applicant and administrator
This module is considered with login of new user and administrator. Every user must enter his Passport and some details about itself for login the home page and after submitted his Passport system provided a particular user-id and password at the time of registration. The administrator can also login from this module. He can insert, delete or update the user login name and password.this module check the authenticity of the person accessing the project. The main objective behind this module is to provide security to the project so that access is restricted to the authorized users.
            Input is taken as login and password that the user Enters.
            This login id and password sent back to the activeX exe through DLL to check the information in the database.
            If the login id and password entered by the user matches those of the database file then it will return and redirected to respective control panel, other wise give a Error massage “login denied”.

v  Registration of user: It takes the information the user and enter it into the database. This module uses the table ‘Documantations for its operation
                   This table has following sub module.
  • Add
  • Edit
  • Save
  • Delete
v Passport description: It takes the information form the user and enters it into database. This module user the table ‘PASSPORT’ for its operation.
This table has following sub module.
  • Add
  • Edit
  • Update
  • Delete

v Company info: It takes the information form the user and enters it into database. This module user the table. ‘ Company’ for its operation

v  User profile info:It table the information the user enters it into database. This module user the table ‘resumes’ for its operation.This table user has following sub module:-
  • add
  • update
  • delete

v  Validation master:This module validation the entry made by user if the entry is not as per the specification a wrong message is given.

v Application module:With the user of this module user apply to this company he desire this modules user the table ‘Passport and “apply” for its operation.


REPORT GENERATION



v  Report generation:  This system will generate the report for the an file software like. Following reports are genreaded:-
  • How many user are currently wring the site
  • How many companies are there who has Passport requirement.
  • How many candidate are there who user eligible for particular Passport option
  • Report on Passport selection
  • For Passport seeker on the baric of Passport search by  option
  • Search by Application Number
  • Search by Name and Date of birth
  • Search by data
  • Report of company detail that have Passport requirement.
  • Report on Passport selection for Passport seeker on the basis of quick  search option
  • Report of the new user who has registered and enter Passport and other detail.
  • Report of the registered user who have user id and password.





FUTURE SCOPE
Enhancement of our proposed system after successfully implementing the it can be added in the system that automatically displays the details when the User apply for Passport after mailing his resume.When the developed system runs successfully, it can be also be used that the all Passport company can automatically get the Passport of the user they have same Passport vacancies.
Online User register facility could be brought on Web that would enable the User to register and can see the detail in the system itself by entering his login id No.
There should be some page like Passport sample question paper and online test can give the better option for finding Passport and company need only to conduct viva-exam not written exam for that user who has passed online examination.
If user want to send Passport detail to his friend then there is option to mail Passport detail to friend is necessary in Passport page.
Each of these tasks serves describes the problem so that an overall approach or solution may be synthesized.

1: Registered Module:
In this module, User enters a login & password and the software checks its validity. If the login & password is valid then he is allowed to enter, otherwise “Invalid User/Password” message is displayed. Different data access rights are assigned to different users.

2: Master Module.
This module is used to add new candidate, new Passport ,new company details etc.

3: Apply Module:
In this module, User apply for the Passport which is best suited to him as per their qualification, location.

4: Modifying/Updating Existing Entries:
In this module, whenever an existing entity is required to be modified the corresponding forms are opened and the database is manipulated and the data is fetched. Now the user can made the required changes and then accordingly, he updates the data. Again, the checks are followed in case there is any invalid entry.

5: Searching:
In this module, User can search on the requirement their choice that mean, it (search engine) will help to search in all record/ information of available Passport /company/candidate.

6: Validation of Data Entered by the User & Error Handling:
In this module, the validity of data entered by the user during the various business processes is checked through various validation checks. For example, there should not be any characters entered in the numeric fields, likewise if there is any error occurs than it should handle that particular error and give the required messages.




SECURITY MESAURES


Security in database involves both policies and mechanisms to protect the data and ensure that it is not accessed, altered or deleted without proper authorization. Integrity implies that any properly authorized access, alternation or deletion of the data in the database does not change the validity of the data. The economic or strategic reasons for protecting data from unauthorized access, corruption or destruction, there is a privacy dimension for data security or integrity. Privacy is the ethical and legal rights that individual have with regard to control over the dissemination and use of their personal information.
Data has to be protected in the database. There is a similar need for protection in a non database environment. The operating system must ensure that files belonging to the database are not used directly without proper authorization.

v IDENTIFICATION AND AUTHORIZATION

The authorization mechanism prepares the user profile for a user and indicates the portion of the database accessible to that user and mode of the access allowed. The enforcement of the security policies in the database system requires that the system knows the identity of the user making the requests. This in turn requires that before making any request, the user has to identify herself or himself to the system and the authenticate identification to confirm that the user is in fact the correct person.

v AUTHENTICATION

The simplest and most common authentication scheme used is a password to authenticate the user. The user enters the user name or number and then authenticates her /him by the password. A number of methods can be used in the authentication: by something known only by the user, by something that only the user possesses, or by some physical/physiological characteristics of the user.





No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

SQL Server Unique Constraint

SQL Server Unique Constraint Whats is Unique Constraint in SQL | How to create Unique Constraint in SQL | Unique Constraint with Example in ...